CN102833296B - Method and apparatus for building safe computing environment - Google Patents
Method and apparatus for building safe computing environment Download PDFInfo
- Publication number
- CN102833296B CN102833296B CN201110166629.XA CN201110166629A CN102833296B CN 102833296 B CN102833296 B CN 102833296B CN 201110166629 A CN201110166629 A CN 201110166629A CN 102833296 B CN102833296 B CN 102833296B
- Authority
- CN
- China
- Prior art keywords
- tbs
- computing environment
- information
- protected
- protected application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
Embodiments of the present invention are related to the method and apparatus for building safe computing environment.A kind of method for building safe computing environment on the computing device is disclosed, which is guided by credible bootable storage device TBS, including:It is communicated with remote validation device RV to verify the computing environment guided by TBS, and receives the security strategy generated by RV;The running space of isolation is created in a computing environment for running protected application;And security strategy is applied to protected application during the operation of protected application.A kind of method for verifying the safety of the computing environment built on the computing device is also disclosed, which is guided by TB S, including:It is communicated with TBS to verify the computing environment guided by TB S;Security strategy is generated in response to being proved to be successful, security strategy will be applied in protected application during the operation of protected application in a computing environment;And the security strategy generated to TBS transmission.In addition corresponding equipment is also disclosed.
Description
Technical field
Embodiments of the present invention relate generally to information technology field, more particularly, to by build it is safe based on
The method and apparatus for calculating environment.
Background technology
With the development of computing technique, it is ensured that the safety of computing environment has become an important technology urgently to be resolved hurrily
Problem.Term " safety " as used herein refers to avoiding application in computing environment, process/thread, file, data, code
Etc. various information by it is any it is unwarranted in a manner of be accessed (for example, by Malware, virus and/or worm access),
Integrality and/or privacy to avoid above- mentioned information are destroyed.As an example, being related to bank, finance, financial accounting, individual
The application of privacy information etc. usually has high requirement to safety.Therefore, safe computing environment is built with important
Meaning.
In order to build the computing environment of a safety on given computing device, it usually needs ensure computing environment with it is outer
Portion is isolated.Currently, virtual machine (VM) has been widely used as isolation platform, in the application by between each virtual machine
Natural separation provides security isolation.For example, credible bootable storage device (Trusted Bootable can be passed through
Storage, TBS) build such secured computing environment.TBS is a kind of storage device with guiding function, for example, it
It can be analogous to the portable memory apparatus of universal serial bus (Universal Serial Bus, USB) equipment.In TBS
In, generally comprise oneself operating system (OS) mirror image (that is, virtual machine), manager (for example, monitor of virtual machine, VMM)
And file system.When such TBS equipment is coupled with computing device (for example, personal computer PC), which can be set
It is standby to guide, to build a computing environment based on virtual machine on the hardware platform of the computing device.
However, it will be understood by those skilled in the art that operating system itself can be utilized as attack source, in this feelings
Under condition, such as the direct I O access that passes through peripheral equipment, so that it may to break up this isolation built by virtual machine.Therefore, empty
Isolation between quasi- machine can not form real security isolation.
To solve the above-mentioned problems, it has been proposed that trusted using the software for including in TBS and calculate base (Software
Trusted Computing Base, STCB) further ensure that the safety of isolated computing environment, STCB will be explained below.
In addition, in order to further increase the safety of computing environment, it is also proposed that be customized to operating system (OS) mirror image/kernel, example
Such as remove useless device drives.It is equipped with internal security processor (for example, arm processor) side of being also known for computing environment
One of case.It is also known that another kind of scheme be:By the third party outside computing device to the meter that is built on the computing device
It calculates environment to be verified, meets scheduled security requirement or strategy to ensure it when being created.
Although the scheme of the prior art can improve the safety of computing environment to a certain extent, certain problems and
Defect still has to be solved.First, in the above prior art, it is typically only capable to ensure that computing environment is peace in structure and startup
Complete, and it is unable to ensure the peace of the application for wishing to be protected or process (hereinafter referred to as " protected application ") during runtime
Quan Xing.In addition to this, merely ensure that the safety of computing environment may be not dependent on STCB or third-party authentication one
Profit, because STCB or third party itself may also can not execute correct authentication function due to by attacking.In view of this,
In the art, a kind of improved technical solution for building secured computing environment is needed.
Invention content
In one aspect of the invention, a kind of method for building safe computing environment on the computing device is provided,
The computing device is guided by credible bootable storage device TBS.This method includes:It is communicated with remote validation device RV to verify by institute
The computing environment of TBS guiding is stated, and receives the security strategy generated by the RV;Isolation is created in the computing environment
Running space is for the protected application of operation;And the security strategy is applied during the operation of the protected application
In the protected application.
Optional embodiment according to the present invention is communicated with remote validation device RV to verify the calculating guided by the TBS
Environment may further include:It is verified to RV transmission about the information of the TBS.In such an embodiment,
Information about the TBS may include following one or more:The identification information of the TBS, the operation for including in the TBS
The information of system image, the information for the monitor of virtual machine mirror image for including in TBS, the letter for the file system for including in the TBS
Breath, the information of protected application.
Optional embodiment according to the present invention, this method may further include:Make it is described it is protected application with it is described
Communication between the external service of computing environment is controlled by the RV.In such an embodiment, make the protected application
Communication between the external service of the computing environment is controlled by the RV and may further include:Make the protected application
To RV transmission for the request of the external service;And in response to the request by the RV good authentications, make described
Protected apply communicates under the guiding of the RV with the external service.
In another aspect of this invention, a kind of safety for verifying the computing environment built on the computing device is provided
Method, which is guided by credible bootable storage device TBS.This method includes:Communicated with the TBS with verify by
The computing environment of the TBS guiding;Security strategy is generated in response to described be proved to be successful, the security strategy will be in the meter
It is applied in the protected application during the operation for calculating the protected application in environment;And generated to TBS transmission
The security strategy.
Optional embodiment according to the present invention is verified the computing environment guided by the TBS and be may further include:It connects
Receive the information about the TBS;And the computing environment is verified based on the described information received.In such reality
It applies in mode, the information about the TBS may include following one or more:The identification information of the TBS, in the TBS
Including operating system mirror image information, the information for the monitor of virtual machine mirror image for including in TBS, the text for including in the TBS
The information of part system and the information of protected application.
Optional embodiment according to the present invention, this method may further include:Control the protected application and institute
State the communication between the external service of computing environment.In such an embodiment, the protected application and the meter are controlled
The communication calculated between the external service of environment may further include:The protected application is received for the external service
Request;The protected application is verified;And in response to being proved to be successful to the protected application, guiding it is described by
Protection application is communicated with the external service.
In still another aspect of the invention, a kind of equipment for building safe computing environment on the computing device is provided,
The computing device is guided by credible bootable storage device TBS.The equipment includes:Communication device, is configured to and remote validation
Device RV is communicated to verify the computing environment guided by the TBS, and for receiving the security strategy generated by the RV;Operation
Space creating device is configured to create the running space of isolation in the computing environment for running protected application;
And strategy implement device, be configured to during the operation of the protected application by the security strategy be applied to it is described by
Protection application.
Optional embodiment according to the present invention, communication device may further include:It is configured to transmit to the RV
About the TBS information for verification device.In such an embodiment, the information about the TBS may include
Following one or more:The identification information of the TBS, the information for the operating system mirror image for including in the TBS include in TBS
Monitor of virtual machine mirror image information, the information for the file system for including in the TBS and the information of protected application.
Optional embodiment according to the present invention, the equipment may further include:Application management device is configured to make
Communication between the protected application and the external service of the computing environment is controlled by the RV.In such embodiment
In, the application management device may further include:It is configured to that protected apply to RV transmission is made to be directed to institute
State the device of the request of external service;And it is configured to make described protected by the RV good authentications in response to the request
Shield applies the device communicated with the external service under the guiding of the RV.
In another aspect of this invention, a kind of safety for verifying the computing environment built on the computing device is provided
Validator, the computing device is guided by credible bootable storage device TBS, and the validator is located in the calculating
Equipment it is long-range.The validator includes:Remote validation device, is configured to communicate with the TBS and is guided by the TBS with verifying
Computing environment;Strategy generating device is configured to generate security strategy in response to described be proved to be successful, the security strategy
The protected application will be applied in during the operation of protected application in the computing environment;And strategy transmission dress
It sets, is configured to the security strategy generated to TB S transmission.
Optional embodiment according to the present invention, remote validation device may further include:Be configured to receive about
The device of the information of the TBS;And be configured to verify the computing environment based on the described information received
Device.In such an embodiment, the information about the TBS may include following one or more:The mark of the TBS
Information, the information for the operating system mirror image for including in the TBS, the information for the monitor of virtual machine mirror image for including in TBS are described
The information for the file system for including in TBS and the information of protected application.
Optional embodiment according to the present invention, the validator may further include:Application control device, is configured to
Control the communication between the external service of the protected application and computing environment run in the computing environment.In addition, answering
It may further include with control device:It is configured to receive the dress of request of the protected application for the external service
It sets;It is configured to the device verified to the protected application;And it is configured in response to the protected application
Be proved to be successful and guide and described protected apply the device that is communicated with the external service.
By reading the detailed description below in conjunction with attached drawing, it will be understood to those of skill in the art that utilizing the reality of the present invention
Mode is applied, the safety of computing environment can be protected in terms of multiple and different with angle.First, in structure computing environment
When, pass through the verification of third party (that is, remote validation device RV), it can be ensured that the calculating guided on given computing device by TBS
Environment be not under fire or invasion secured computing environment.In other words, the startup of computing environment is safe.Secondly, in institute's structure
In the computing environment built, the isolation running space for protected application can be created, to fight possible outside invasion.It is preferred that
Ground, the isolation running space can be created and be safeguarded by the monitor of virtual machine (for example, STCB) in TBS.On this basis,
It is applied being loaded during running space is isolated since protected, the behavior in whole life cycle all will be by by long-range
The constraint for the security strategy that authentication RV is generated, protected application implementation of the security strategy from TBS into isolation running environment.
Finally, optionally, when protected application is interacted or communicated with the external service except computing environment during runtime
When, which still will undergo the additional identification of RV.
It will be understood that by the detailed description below in conjunction with attached drawing, according to the embodiment of the present invention, will not only create
With the safety of computing environment is ensured when starting, and (especially in itself and outside during the whole service of protected software
When communication for service) it may be by the implementation of security strategy and additional third-party authentication and ensure the safety of computing environment.With
This mode, when remote validation, isolation running space when being started by the way that computing environment is used in combination are to the operation of protected application
Protection and the local of telesecurity strategy are implemented, and the safety of computing environment is can effectively improve.
Description of the drawings
Detailed description below, above-mentioned and other purposes, the feature of embodiment of the present invention are read by reference to attached drawing
It will become prone to understand with advantage.In the accompanying drawings, several implementations of the present invention are shown by way of example rather than limitation
Mode, wherein:
Fig. 1 shows the method for building safe computing environment on the computing device according to embodiment of the present invention
100 flow chart;
Fig. 2 shows the safety for verifying the computing environment that builds on the computing device according to embodiment of the present invention
The flow chart of the method 200 of property;
Fig. 3 shows the equipment for building safe computing environment on the computing device according to embodiment of the present invention
300 block diagram;
Fig. 4 shows the safety for verifying the computing environment built on the computing device according to embodiment of the present invention
The block diagram of the validator 400 of property;
Fig. 5 shows the block diagram of the exemplary system 500 according to embodiment of the present invention;And
Fig. 6 shows the block diagram of the exemplary computer device 600 suitable for being used in combination with embodiments of the present invention.
Specific implementation mode
Below with reference to the accompanying drawings detailed description of the present invention embodiment.It is as outlined above and discussed in more detail below,
In an embodiment of the invention, it can ensure to set in calculating using credible bootable storage device (TBS) from many aspects
The safety of the computing environment of standby upper structure.
Before describing embodiments of the present invention, the definition of several terms is provided first.Term as used herein " calculates
Environment " refers to the environment run wherein for program.One computing environment includes mainly two aspects:Hardware environment and software loop
Border.Hardware environment is mainly made of central processing unit (CPU), memory, bus, I/O equipment and certain peripheral equipments.It is soft
Part environment is primarily referred to as the environment of application program operation, including a series of software stacks established from hardware, including but unlimited
In:Monitor of virtual machine (Virtual Machine Monitor, VMM), operating system (OS), middleware, system service journey
Sequence, etc..
In addition, the credible bootable storage device (TBS) of term as used herein refers to a kind of storage device, when it is connected
When to an external physical computing device, the computing device can be guided using its internal storage device, to utilize
The physical hardware platform of the computing device builds a computing environment.As described above, TBS generally comprise oneself OS mirror images,
Manager (for example, VMM) and file system.In addition, TBS may be fitted with non-breakable cipher engine, such as credible peace
Full console module (Trusted Platform Module, TPM) or the token engine similar to RSA, should to generate mark
The information of TBS identity, this is only several examples.Common TBS can be implemented as the portable device of USB device etc, so
And this is merely exemplary and not limiting.Particularly, it should be understood that guide the computing environment of structure only using TB S
Using the hardware in other words based on physical computing devices, and it is unrelated with the operating system and software application installed or run thereon.
In addition, term " application " used herein indicate any software that can be run in a computing environment, program instruction,
Process and/or thread.Also include Client application using both including system application.Correspondingly, term " protected application " refer to by
It is ensured during operation and is not applied by other Malware infringements in the more demanding of safety.
In the following, detailed description of the present invention principle and essence will be come in conjunction with several illustrative embodiments shown in the accompanying drawings
God.Referring initially to Fig. 1, it illustrates be used to build safe computing environment on the computing device according to embodiment of the present invention
Method 100 flow chart.Note that each step described in method 100 can execute and/or parallel in a different order
It executes.Method 100 can also include the steps that additional step and/or omission execution are shown.The scope of the present invention is in this regard
It is unrestricted.
Method 100 is executed in TBS/ computing devices side.Particularly, method 100 can be in response to TBS to computing device
It guides and executes.It is appreciated that in response to the guiding of TBS, on the hardware environment of the computing device, software environment will be created
It builds.The software environment at least may include:Operating system OS, software trust calculate base STCB.Software environment and hardware environment one
It rises and constitutes the computing environment guided by TBS
After method 100 starts, in step S102, communicated with remote validation device RV to verify the calculating ring guided by TBS
Border, and receive the security strategy generated by the RV.Remote validation device RV is located in computing device and the remote location of TBS
Any appropriate entity, the computing environment for being configurable to guide TBS is verified, and (this is detailed below with regard to Fig. 2
It states).
It will be understood to those of skill in the art that whether the computing environment guided is credible or safe, largely
Depending on guiding the TBS of computing device whether credible or safe.Therefore, according to the preferred embodiment of the present invention, RV is to meter
The verification of environment is calculated based on the information about TB S.In such an embodiment, the letter about TBS can be sent to RV
Breath, it is including but not limited to following one or more:The identification information of TBS, management program (that is, VMM) mirror image for including in TBS
Information, the information for the OS mirror images for including in TBS, the information for the file system for including in TBS, and run in isolation running space
Protected application information, etc..
According to the embodiment of the present invention, the part as computing environment verification can be come using the identification information of TBS
Verify the identity of the TBS.For example, TBS identification informations can be related to unique sequence numbers associated with the TBS and prove this only
The key of one sequence number.The unique sequence numbers such as can by TBS in the token engine of TPM or RSA etc that is equipped with
To generate.Meanwhile underground key is also stored with inside TBS, such as the private key in public key cryptosyst (PKI).In general, private key
It is underground, and the unique sequence numbers of TBS and public key corresponding with private key are disclosed.It is possible thereby to uniquely determine
The identity of TBS.Alternatively or additionally, in certain other embodiments, TBS identification informations can be related to fixed key with
And the key digital of dynamic change.At this point it is possible to verify the identity of TBS using " dual factors " (two-factor) mechanism.With
On enumerate is only several examples, any TBS identification informations appropriate and TBS authentication means each fall within the model of the present invention
Within enclosing.
Correspondingly, the advance agreement negotiated or followed jointly according to TBS and RV about certification can preserve at RV
About it is legal or certification TBS for information about and TBS should meet it is corresponding constraint (for example, for OS mirror images, VMM mirrors
The constraint, etc. of picture and/or file system).If transmitted information and the information match and corresponding preserved at RV
Constraint is met, then RV being proved to be successful for the TBS computing environment guided.
It should be appreciated that other than the information about TBS or alternatively, RV guide TBS the verification of computing environment
It is also conceivable to other factors.For example, according to some embodiments of the present invention, verification process can be based on currently used be somebody's turn to do
Other verification informations for the information of the physical computing devices that the information of the user of TBS, TBS are guided, dynamic/generate at random, etc.
Deng.The scope of the present invention is not limited in this respect.
As described below, as RV to computing environment when being proved to be successful, in response, RV will be generated to be calculated for current
Security strategy in environment.Such security strategy can be predefined, and/or according to the design parameter of current computing environment
And dynamic generates.According to some embodiments of the present invention, the security strategy that RV is generated may include for application output communication
Limitation, such as protected apply is forbidden to access hostile network address after under attack, reveal information to unauthorized party, etc.
Deng.This is only example, other any security strategies appropriate are all feasible.Moreover, the security strategy that RV is generated can be
General, it can also be specific to protected security application, this will be explained below.The security strategy generated is from RV to the sides TBS
It sends, and is received at step S 102.
In certain preferred embodiments, in step S 102, the software in the computing environment that TBS is guided can be utilized
Trusted computing base (STCB) executes the communication with RV and the reception of security strategy.Term " software trust meter as used herein
Calculation base " (STCB) is the highest application of permission in the computing environment that TBS is guided, i.e. privilege application.Once STCB is in general, TBS
To generate computing environment, STCB is loaded guiding computing device.For example, in some embodiments, STCB may be implemented
For a part of monitor of virtual machine VMM or VMM.
It should be noted that with RV communicating and receive security strategy using STCB may insure the safety of the operation and reliable
Property, but this it is not necessary to.Indeed, it is possible to utilize any hardware, software and/or firmware in TBS and/or computing device
Module realizes that the function of step S 102, the scope of the present invention are not limited in this respect.
It is further noted that in step S 102, the communication between STCB and RV, which can utilize, to be currently known or opens in the future
The various wired and/or wireless communication mechanism of hair is realized.The scope of the present invention is also unrestricted in this regard.
Next, method 100 proceeds to step S104, here, creating the operation of isolation in the computing environment of TBS guiding
Space is for the protected application of operation.As described above, after it TBS connections or will be coupled to certain computing device, TBS can
To guide the computing device using its storage inside, to build a computing environment on its hardware platform.In the meter
It calculates in environment, in order to ensure the safety of protected application, the isolation running space of protected application operation can be created for.This
The running space of class isolation can fight the invasion and destruction of Malware, and can include that (random access stores to RAM
Device) in code/data protection and for I/O (input/output) protection.
It should be appreciated that operation and subsequent telesecurity strategy of the establishment of isolation running space for protected application
Implementation plays an important roll.According to the preferred embodiment of the present invention, isolation running space for example can by following steps come
It creates:Initialize protected application;The dynamic computing environment of the protected application is controlled to prevent from illegally using;Prison
The use for controlling memory management unit (MMU) carries out insulation blocking to the storage space of protected application;And monitoring is defeated
Enter/the use of output storage administrative unit (IOMMU), to peripheral equipment by IOMMU carry out between protected application
Interactive operation controlled.Particularly, such isolation running space can be created by STCB.Present applicant in
In 08 month 2010 Chinese invention patent application number 201010262383.1 submitted for 25th, it is described in detail and is created using STCB
The principle of such isolation running space and realization.It is incorporated by reference into all the contents of the application herein.
It should be appreciated that be only exemplary using STCB to create the running space of isolation, and not in any way
It limits the scope of the invention.Indeed, it is possible to drawn using any proper technology means for being currently known or developing in the future
The running space of isolation is built in the computing environment led.
Then, it at the step S 106 of method 100, during the operation of protected application, will be received at step S104
, by RV generate security strategy be applied to protected application.Note that term as used herein refer to " during operation " using from
It is loaded the whole life cycle started until end of run.
According to the preferred embodiment of the present invention, the implementation of security strategy can be realized using the STCB in TBS.It can be with
Understand, as described above, STCB is the highest privilege application of permission in TBS, and the isolation operation for running protected application is empty
Between can be built by STCB.Thus, for example STCB is advantageous to implement the security strategy of RV settings.
In certain optional embodiments of the present invention, method 100 then proceeds to optional step S108.In optional step
Rapid S108 makes the protected application of each of computing environment be controlled by far with the communication between the external service except the computing environment
Journey validator RV.It is appreciated that in the operational process of a protected application, it may be needed and the clothes outside computing environment
Business (as an example, back-end server, etc. in cloud computing) is communicated.At this point, the exchange due to being related to information, having can
It can destroy the safety of computing environment.For this purpose, optional embodiment according to the present invention, these protected applications and external service
Communication to receive the control and supervision of remote validation device RV.
According to the preferred embodiment of the present invention, the protected application in computing environment and the communication between external service with
RV is intermediary, and is controlled by it.For example, in some embodiments, step S108 can include these following sub-steps.It is first
First, when protected application is wished to be communicated with external service, it is made to be directed to the external service to the RV transmission of remote validation device
Request, rather than directly communicated with the applications.RV will carry out a series of verification behaviour upon receipt of the request
Make, this will be explained below.If be proved to be successful, in the sides TBS, protected application can under the guiding of RV with external service
Communication.For example, in response to being proved to be successful, RV can allow protected application to be directly connected to applications and exchange information.
In the present invention, RV can differently hold protected application with the verification communicated between external service
Row.For example, in some embodiments, it is protected to apply the verification that RV is all had to pass through with any communication of external service.It is standby
Selection of land only can carry out intermediary's verification when a protected application communicates for the first time with an external service by RV.In addition, RV
Such verification might also depend on the various factors such as period, the feature of external service and information.
It should be appreciated that it is above-described using RV as it is protected application and the intermediary between external service, only with
RV controls the preferred embodiment communicated therebetween.Other embodiment is equally possible.For example, in certain alternative implementations
In mode, protected application can be communicated according to the preset rules of RV with external service.The scope of the present invention exists
It is unrestricted in this respect.
According to the method 100 described above with reference to Fig. 1, local mechanism (for example, STCB) and long-range mechanism can be utilized
(RV) coordination between and cooperation, to ensure the safety of the protected application in guided computing environment.Furthermore, it is possible to manage
Solution, different from only safety is verified and checked when computing environment is built and is started in the prior art, according to the present invention
Embodiment, security strategy will be carried out in the whole life cycle of protected software application.Particularly, protected application
Communication between external service may also pass through additional verification.Remote validation when being started as a result, by computing environment, every
The local implementation of establishment and telesecurity strategy in running space is isolated from running space, can more effectively ensure
The safety of computing environment.
It is described above by reference to Fig. 1 and is used to build secured computing environment what TBS or computing device side were executed
Method 100.Below with reference to Fig. 2, the computing environment being used for being built on computing device executed in remote validation device side is described
The method 200 verified.Similar to method 100, each step described in method 200 can execute in a different order
And/or parallel execution.Method 200 can also include the steps that additional step and/or omission execution are shown.
After method 200 starts, at step S202, remote validation device RV can draw with guiding the credible of computing device
Storage device (TBS) communication is led, so that the computing environment guided the TBS is verified.Such as described in reference diagram 1, root above
According to the preferred embodiment of the present invention, RV is realizing for information about based on TBS to the verification of computing environment.It is specific and
Speech can receive the information about TBS at step S202 from the sides TBS, and described information includes but not limited to next or more
It is a:The identification information of TBS, the information for the monitor of virtual machine mirror image for including in TBS, the information of OS mirror images, the text for including in TBS
The information of part system and the information, etc. of protected application.
In such an embodiment, the sides RV can preserve about it is legal or certification TBS for information about and should
The corresponding constraint (for example, for constraint of OS mirror images and/or file system) that TBS should meet.If transmitted information with
The information match preserved at RV, and constraint is met accordingly, then and RV is directed to testing for the computing environment that the TBS is guided
It demonstrate,proves successfully.It has been begged for above in association with the step S102 in Fig. 1 about the verification performed by TBS identification informations and RV
By details are not described herein.
Other than the information about TBS or alternatively, at step S202, RV is also conceivable to other factors pair
The computing environment of TBS guiding executes verification.For example, according to some embodiments of the present invention, RV can connect at step S202
Receive other for the information of the user of the currently used TBS, the information for the physical computing devices that TBS is guided, dynamic/generate at random
Verification information etc., and whether be trusty based on these information to verify current TBS and by the computing environment of its guiding
With safety.The scope of the present invention is not limited in this respect.
Next, at step S204, determines and success is verified whether to computing environment at step S202.If verification is not
Success, then method 200 proceeds to step S206, carries out error handle herein.According to the embodiment of the present invention, at step S206
Error handle can based on it is any be currently known or in the future exploitation error handling mechanism.For example, RV can be sent to TBS
Indicate the message of authentication failed.For another example, the reason of RV can also indicate authentication failed to TBS.This is only several examples, this
The range of invention is not limited in this respect.
On the other hand, if determining that the success to computing environment certification, method 200 proceed to step at step S204
S208 generates security strategy herein.According to the embodiment of the present invention, the security strategy generated herein can be it is predefined,
And/or it is dynamically generated according to the design parameter of current computing environment.As described above, the security strategy of RV generations may include
For the limitation of application output communication, for example, forbid it is protected apply access after under attack hostile network address, to without
Authorized party reveals information, etc..Moreover, the security strategy that RV is generated can include communication security policy, the peace specific to application
The combination of full strategy or the two.Specifically, can generate will all have all protected applications in isolation running space
The general security strategy of effect, can also according to characteristic, state, requirement of currently running protected application etc. and generate have
Targetedly security strategy.
Then, in step S210, the security strategy of generation is transmitted to the sides TBS.As described above, at step S208 by
RV generate and be transmitted in step S210 the sides TBS security strategy will be applied in the running environment that TBS is guided every
Whole life cycle from the protected application in running space.
Hereafter, certain optional embodiments according to the present invention, method 200 proceed to step S212, are controlled herein by RV
Protected application in computing environment and the communication between the external service except the computing environment.As described above, according to this
The certain embodiments of invention, the control at step S212 can be realized in this way:Being protected in computing environment
Application is protected with the communication between external service using RV as intermediary, and is controlled by it.For example, in some embodiments, step
S212 can include these following sub-steps.First, RV can receive protected application for the external service from the sides TBS
Request.Hereafter, RV can verify the protected application.According to the embodiment of the present invention, RV is to protected application
Verification can be realized based on any any application program verification mechanism for being currently known or developing in the future.For example, RV can be with
Identification information, current state, requested operation based on the protected application, if be authorized to use requested external clothes
Business etc. various factors verifies the protected application.
If RV is proved to be successful protected application, RV can guide the protected application and the external service
It is communicated.For example, RV can indicate protected application:It is allowed directly to be communicated with requested external service.
As described above, at step S212, RV can be by protected application and the verification that is communicated between external service
It is executed according to different modes.For example, in some embodiments, protected application and any communication of external service all have to pass through
The verification of RV.It is tested it is alternatively possible to only carry out intermediary by RV when a protected application communicates for the first time with an external service
Card.In addition, such verification of RV might also depend on the various factors such as period, the feature of external service and information.
It should be appreciated that it is above-described using RV as it is protected application and the intermediary between external service, only with
RV controls the preferred embodiment communicated therebetween.Other embodiment is equally possible.For example, in certain alternative implementations
In mode, protected application can be communicated according to the preset rules of RV with external service.The scope of the present invention exists
It is unrestricted in this respect.
Below with reference to Fig. 3, it illustrates according to embodiment of the present invention by building on the computing device based on safety
Calculate the block diagram of the equipment 300 of environment.According to the embodiment of the present invention, equipment 300 may reside in the TBS of guiding computing device
On, or it is embodied as a part of TBS.Alternatively or additionally, equipment 300 can also be independently of TBS, and with any appropriate
Mode coupled with TBS.The scope of the present invention is not limited in this respect.
According to the embodiment of the present invention, equipment 300 may include communication device 302, is configurable to and remotely tests
Device RV communications are demonstrate,proved to verify the computing environment guided by TBS, and for receiving the security strategy generated by RV.According to the present invention
Certain embodiments, communication device 302 may include be configured to RV transmission about TBS information for verification dress
It sets.Information about TBS may include following one or more:The identification information of TBS, the operating system mirror image for including in TBS
Information, the information for the monitor of virtual machine mirror image for including in TBS, the information for the file system for including in TBS and protected
The information of application.
According to the preferred embodiment of the present invention, the meter that the communication device 302 of equipment 300 can be guided by means of TBS
The software trust calculating base STCB execution loaded in environment is calculated to communicate with remote validation device RV.Note that implementation according to the present invention
Mode, communication device 302 can be supported based on the various wired and/or wireless communication equipment for being currently known or developing in the future
It makes to be communicated with RV.The scope of the present invention is not limited in this respect.
In addition, as shown in figure 3, further include running space creating device 304 according to the equipment 300 of embodiment of the present invention,
It is configurable to create the running space of isolation in the computing environment that TBS is guided for running protected application.According to
The preferred embodiment of the present invention, running space creating device 304 may be configured to create such isolation using STCB
Running space.
In addition, according to the embodiment of the present invention, equipment 300 further includes strategy implement device 306, is configurable to
Security strategy is applied to protected application during the operation of protected application.According to the preferred embodiment of the present invention, tactful
Implementation 306 can utilize STCB to apply security strategy to protected application.
Optionally, equipment 300 may include application management device 308, be configurable to make protected application and calculating
Communication between the external service of environment is controlled by RV.According to certain embodiments, application management device 308 can be wrapped further
It includes:It is configured to make the protected device applied to RV transmission for the request of external service;And it is configured to make protected
Apply the device communicated with external service under the guiding of RV.
Below with reference to Fig. 4, it illustrates according to embodiment of the present invention based on verifying and building on the computing device
Calculate the block diagram of the validator 400 of the safety of environment.Validator 400 is located in computing device or for guiding computing device
TBS's is long-range, therefore also referred to as remote validation device (RV).
According to the embodiment of the present invention, validator 400 includes remote validation device 402, is configurable to and guides
The credible bootable storage device TBS communications of computing device, to verify the computing environment that TBS is guided.According to certain optional realities
Mode is applied, remote validation device 402 may further include:It is configured to receive the device of the information about TBS;And configuration
Device for being verified to computing environment based on the information received.According to some embodiments of the present invention, about TBS
Information include following one or more:The identification information of TBS, the information for the operating system mirror image for including in TBS are wrapped in TBS
The information of the monitor of virtual machine mirror image contained, the information for the file system for including in TBS and the information of protected application.
In addition, according to the embodiment of the present invention, validator 400 further includes strategy generating device 404, is configurable to
Security strategy is generated in response to being proved to be successful, security strategy will be applied during the operation of protected application in a computing environment
It is added on protected application.Moreover, validator 400 further includes tactful transmission device 406, it is configurable to transmit generation to TBS
Security strategy.According to the embodiment of the present invention, tactful transmission device 406 can be supported to be based on being currently known or open in the future
Various wired and/or wireless communication mechanism of hair transmits security strategy to the sides STB.
In addition, certain optional embodiments according to the present invention, validator 400 can also include application control device 408,
It is configurable to the communication between the protected application run and its external service in control computing environment.It is according to the present invention
Certain embodiments, application control device 408 can further comprise:It is configured to receive protected application for external service
The device of request;It is configured to the device verified to protected application;And it is configured in response to protected application
Be proved to be successful and guide and protected apply the device that is communicated with external service.
It should be appreciated that the equipment 300 describe above with reference to Fig. 3 can as the entity of method 100 in execution Fig. 1, and
It can be as the entity for executing method 200 in Fig. 2 with reference to the validator 400 that figure 4 describes.As a result, above with respect to method 100 and side
All features that method 200 describes are equally applicable to equipment 300 and validator 400.
Moreover, it should also be understood that each device in equipment 300 and validator 400 sharp can in various manners be realized, wrap
Include software, hardware, firmware or its arbitrary combination.For example, in some embodiments, it is each in equipment 300 and validator 400
Device can be realized using software and/or firmware module.In addition, these devices can also be realized using hardware module.Example
Such as, application-specific integrated circuit (ASIC) or system on chip (SOC) may be implemented in the device in equipment 300 and validator 400.Now
Known or exploitation in the future other modes are also feasible, and the scope of the present invention is not limited in this respect.
Referring now to Figure 5, it illustrates the block diagrams according to the exemplary system 500 of embodiment of the present invention.Note that scheming
In 5 example, the equipment for creating secured computing environment can be realized (as a result, by the equipment 300 described above with reference to Fig. 3
For convenience, it is referred to as in following discussion " equipment 300 "), and remote validation device RV can be by above shown in Fig. 5
It is realized with reference to the validator 400 that figure 4 describes.It shall yet further be noted that although equipment 300 is shown to include in TBS in Figure 5,
This is only exemplary.As described above, equipment 300 and TBS can have various coupled relations.It is retouched below with reference to Fig. 5
It states and how to build safe computing environment on the computing device that TBS is guided in embodiments of the present invention.
First, when credible bootable storage device TBS is coupled or be connected to some computing device by user, the TBS
Computing device is guided (S502) using its own internal storage device.In response to the guiding of TBS, in the computing device
Hardware environment on, software environment is created.The software environment at least may include:Operating system OS, software trust calculate
Base STCB.Software environment and hardware environment together form the computing environment guided by TBS.
At this point, the communication device (referring to Fig. 3) in equipment 300 can be communicated with remote validation side RV (preferably, by means of
STCB), to verify the computing environment (S504) that TBS is guided.RV according to receive information (such as it is described above about
The information of TBS) computing environment is verified.In response to being proved to be successful, RV generates security strategy, and is returned to TBS/
Computing device side (S506).As shown in figure 5, in illustrative preferred embodiment, the communication device in equipment 300 still may be used
To receive the security strategy using STCB.
Then, the running space creating device in equipment 300 is preferably by STCB structures (referring to Fig. 3) for protected
The isolation running space of application, and the security strategy received from RV is applied to the whole life cycle of protected application
(S508)。
Hereafter, optionally, if protected application expectation is communicated with applications, which will be controlled by RV.Specifically,
According to certain embodiments, equipment 300 can make protected application that will be sent to RV (S510) for the request of external service.RV
Protected application is verified, and guides the request of protected application to as target in the case where being proved to be successful
External service (S512).Hereafter, protected application can under the guiding of RV with applications direct communication (S514).
Referring now to Figure 6, it illustrates suitable for the schematic of the computer system 600 for putting into practice embodiment of the present invention
Block diagram.For example, computer system 600 shown in Fig. 6 can be used for realizing the above-described computing device guided by TBS.
As shown in fig. 6, computer system may include:CPU (central processing unit) 601, RAM (random access memory) 602, ROM
(read-only memory) 603, system bus 604, hard disk controller 605, keyboard controller 606, serial interface controller 607, simultaneously
Line interface controller 608, display controller 609, hard disk 610, keyboard 611, serial peripheral equipment 612, concurrent peripheral equipment 613
With display 614.In such devices, what is coupled with system bus 604 has CPU 601, RAM 602, ROM 603, hard disk control
Device 605, keyboard controller 606, serialization controller 607, parallel controller 608 and display controller 609 processed.Hard disk 610 with it is hard
Disk controller 605 couples, and keyboard 611 is coupled with keyboard controller 606, serial peripheral equipment 612 and serial interface controller 607
Coupling, concurrent peripheral equipment 613 is coupled with parallel interface controller 608 and display 614 is coupled with display controller 609.
It should be appreciated that the structure diagram described in Fig. 6 is shown for illustrative purposes only, rather than to the limit of the scope of the invention
System.In some cases, it can increase or reduce certain equipment as the case may be.
It should be appreciated that in addition to hardware embodiment, embodiments of the present invention can pass through computer program product
Form is realized.For example, can pass through computer program with reference to the method 100 that figure 1 describes and with reference to the method 200 that figure 2 describes
Product is realized.The computer program product can be stored in RAM 604 for example shown in fig. 6, ROM 604, hard disk 610 and/
Or in any storage medium appropriate, or downloaded in computer system 600 from position appropriate by network.Computer journey
Sequence product may include computer code part comprising can be by processing equipment appropriate (for example, CPU shown in Fig. 6
601) program instruction executed.According to the embodiment of the present invention, described program instruction at least may include for realizing method
100 and method 200 in each step executable instruction.
Several specific implementation modes through the invention illustrate the thought and principle of the present invention in detail above.Pass through
Above description is appreciated that according to the embodiment of the present invention, can utilize local both mechanism and long-range mechanism, from different
Aspect ensures the safety of computing environment.Moreover, according to the embodiment of the present invention, security strategy will be in protected software application
Whole life cycle in be carried out.In addition, protected application may also pass through additional the with the communication between external service
Tripartite verifies.Remote validation when being started as a result, by computing environment, isolation running space when the operation of protected application to protecting
Shield and the local of telesecurity strategy are implemented, it is ensured that and improve the safety of created computing environment.
Note that in above-described flow chart and block diagram, each frame can represent the portion of module, program segment or code
Point, the part of these module, program segment, or codes includes one or more executable fingers for implementing the specified logical function
It enables.It shall yet further be noted that in certain alternate embodiments, the function of being marked in frame can also be according to different from shown in figure suitable
Sequence occurs.For example, two boxes succeedingly indicated can essentially be basically executed in parallel, they sometimes can also be by opposite
Sequence execute, this depend on involved concrete function.It shall yet further be noted that each frame and frame in block diagram and or flow chart
The combination of figure and/or the box in flow chart can use the dedicated hardware based system of functions or operations as defined in executing
It realizes, or can realize using a combination of dedicated hardware and computer instructions.
Complete hardware embodiment, complete software embodiment party can be taken according to the method and apparatus of embodiment of the present invention
Formula had not only included hardware component but also had included the form of the embodiment of component software.In a preferred embodiment, the present invention realizes
For software comprising but be not limited to firmware, resident software, microcode etc..
Moreover, of the invention can also take can computer program production available from computer or computer-readable medium access
The form of product, these media provide program code so that computer or any instruction execution system use or in connection.
For the purpose of description, computer can be used or computer-readable mechanism can be any tangible device, can include, store,
Communicate, propagate, or transport program with by instruction execution system, device or equipment use or it is in connection.
Medium can be electric, magnetic, light, electromagnetism, infrared ray or semiconductor system (or device or device)
Or propagation medium.The example of computer-readable medium include semiconductor or solid-state memory, tape, removable computer diskette,
Random access storage device (RAM), read-only memory (ROM), hard disc and CD.The example of CD includes compact disk-at present
Read memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
It is suitble to the data processing system of storage/or execution program code include at least one processor, directly
Or memory component is indirectly couple to by system bus.Memory component may include the practical execution phase in program code
Between utilized local storage, mass storage and provide the interim storage of at least part program code to subtract
The cache memory of the number of code must be fetched during few execution from mass storage.
Input/output or I/O equipment (including but not limited to keyboard, display, pointer device etc.) can directly or
It is coupled to system by intermediate I/O controllers.
Network adapter can also be coupled to system, so that data processing system can pass through the private or public of centre
Network and be coupled to other data processing systems or remote printer or storage device.Modem, cable modem
And Ethernet card is only several examples of currently available types of network adapters.
Although having had been described above several embodiments of the present invention, it should be appreciated to those skilled in the art that this
A little descriptions be merely exemplary with it is illustrative.According to the introduction and enlightenment of specification, true spirit of the present invention is not being departed from
In the case of, embodiments of the present invention can be carry out various modifications and be changed.Therefore, the feature described in specification should not be by
It is considered restrictive.The scope of the present invention is defined solely by the appended claims.
Claims (20)
1. a kind of method for building safe computing environment on the computing device, the computing device is deposited by credible may be guided
Equipment TBS guiding is stored up, the method includes:
It is communicated with remote validation device RV to verify the safe calculating ring on the computing device guided by the TBS
Border;
In response to the good authentication of the safe computing environment on the computing device that guides the TBS, receive by
The security strategy that the RV is remotely generating, wherein the security strategy is the one or more according to the safe computing environment
Parameter and it is that dynamic generates and be configured as being performed in the safe computing environment on said computing device;
It is protected for running that the running space of isolation is created in the safe computing environment on said computing device
Using;And
During the operation of the protected application in the safe computing environment on said computing device, by the RV
The security strategy being remotely generating is applied to the protected application;
The wherein described security strategy calculates base (STCB) to receive and execute by the software trust in the safe computing environment
To create the running space of the isolation.
2. according to the method described in claim 1, wherein being communicated with remote validation device RV to verify the calculating guided by the TBS
Environment further comprises:
It is verified to RV transmission about the information of the TBS.
3. according to the method described in claim 2, including wherein following one or more about the information of the TBS:The TBS
Identification information, the status information for the operating system mirror image for including in the TBS, the monitor of virtual machine for including in the TBS
The information of mirror image, the information for the file system for including in the TBS and the information of the protected application.
4. according to the method described in claim 1, further comprising:
The communication between the protected application and the external service of the computing environment is set to be controlled by the RV.
5. according to the method described in claim 4, wherein make the protected application and the external service of the computing environment it
Between communication be controlled by the RV and further comprise:
Make the protected request applied to RV transmission for the external service;And
In response to the request by the RV good authentications, make it is described it is protected apply under the guiding of the RV with the outside
Communication for service.
6. a kind of method for verifying the safety of the computing environment built on the computing device, the computing device is by credible
Bootable storage device TBS guiding, the method includes:
It is communicated with the TBS to verify the computing environment on the computing device guided by the TBS;
Security strategy is remotely generating in response to described be proved to be successful, the security strategy is configured as on said computing device
The computing environment in protected application operation during be applied in the protected application, wherein the security strategy
It is one or more parameters according to the computing environment and dynamic generates;And
The security strategy being remotely generating is transmitted to the TBS.
7. further comprising according to the method described in claim 6, wherein verifying the computing environment guided by the TBS:
Receive the information about the TBS;And
The computing environment is verified based on the described information received.
8. according to the method described in claim 7, including wherein following one or more about the information of the TBS:The TBS
Identification information, the information for the operating system mirror image for including in the TBS, the monitor of virtual machine mirror image for including in the TBS
Information, the information for the file system for including in the TBS and the information of the protected application.
9. according to the method described in claim 6, further comprising:
Control the communication between the protected application and the external service of the computing environment.
10. according to the method described in claim 9, wherein controlling the external service of the protected application and the computing environment
Between communication further comprise:
Receive the request that the protected application is directed to the external service;
The protected application is verified;And
In response to being proved to be successful to the protected application, the guiding protected application is led to the external service
Letter.
11. a kind of equipment for building safe computing environment on the computing device, the computing device is by credible bootable
Storage device TBS guiding, the equipment include:
Communication device is configured to be communicated with remote validation device RV to verify on the computing device guided by the TBS
The safe computing environment, and on the computing device in response to guiding the TBS it is described it is safe based on
The good authentication of environment is calculated, the security strategy being remotely generating by the RV is received, wherein the security strategy is according to the peace
One or more parameters of full computing environment and it is that dynamic generates and be configured as the peace on said computing device
It is performed in full computing environment;
Running space creating device is configured to create isolation in the safe computing environment on said computing device
Running space is for the protected application of operation;And
Strategy implement device, be configured in the safe computing environment on said computing device described protected answers
During operation, the security strategy being remotely generating is applied to the protected application;
The wherein described security strategy calculates base (STCB) to receive and execute by the software trust in the safe computing environment
To create the running space of the isolation.
12. equipment according to claim 11, wherein the communication device further comprises:
Be configured to the RV transmission about the TBS information for verification device.
13. equipment according to claim 12, wherein the information about the TBS includes following one or more:It is described
The identification information of TBS, the information for the operating system mirror image for including in the TBS, the monitor of virtual machine mirror for including in the TBS
The information of picture, the information for the file system for including in the TBS and the information of the protected application.
14. equipment according to claim 11, further comprises:
Application management device, be configured to make communication between the protected application and the external service of the computing environment by
It controls in the RV.
15. equipment according to claim 14, wherein the application management device further comprises:
It is configured to make the protected device applied to RV transmission for the request of the external service;And
It is configured to be made by the RV good authentications in response to the request described protected apply under the guiding of the RV
The device communicated with the external service.
16. it is a kind of for verify the computing environment built on the computing device safety validator, the computing device by
Credible bootable storage device TBS guiding, and the validator is located in the long-range of the computing device, the validator packet
It includes:
Remote validation device is configured to be communicated with the TBS to verify the institute on the computing device guided by the TBS
State computing environment;
Strategy generating device is configured to be remotely generating security strategy in response to described be proved to be successful, the security strategy quilt
Described protected is applied in during the operation for the protected application being configured in the computing environment on said computing device
Shield application, wherein the security strategy is one or more parameters according to the computing environment and dynamic generates;And
Tactful transmission device is configured to transmit the security strategy being remotely generating to the TBS.
17. validator according to claim 16, wherein the remote validation device further comprises:
It is configured to receive the device of the information about the TBS;And
It is configured to the device verified to the computing environment based on the described information received.
18. validator according to claim 17, wherein the information about the TBS includes following one or more:Institute
State the identification information of TBS, the information for the operating system mirror image for including in the TBS, the monitor of virtual machine for including in the TBS
The information of mirror image, the information for the file system for including in the TBS and the information of the protected application.
19. validator according to claim 16, further comprises:
Application control device is configured to control the outer of the protected application that is run in the computing environment and the computing environment
Communication between portion's service.
20. validator according to claim 19, wherein the application control device further comprises:
It is configured to receive the device of request of the protected application for the external service;
It is configured to the device verified to the protected application;And
It is configured in response to guiding protected being proved to be successful for application the protected application and the external clothes
The device that business is communicated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110166629.XA CN102833296B (en) | 2011-06-13 | 2011-06-13 | Method and apparatus for building safe computing environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110166629.XA CN102833296B (en) | 2011-06-13 | 2011-06-13 | Method and apparatus for building safe computing environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102833296A CN102833296A (en) | 2012-12-19 |
CN102833296B true CN102833296B (en) | 2018-10-23 |
Family
ID=47336266
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110166629.XA Active CN102833296B (en) | 2011-06-13 | 2011-06-13 | Method and apparatus for building safe computing environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102833296B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3026558A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
EP3026557A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
US10248791B2 (en) * | 2015-07-20 | 2019-04-02 | Intel Corporation | Technologies for secure hardware and software attestation for trusted I/O |
DE102016009232A1 (en) * | 2016-07-28 | 2018-02-01 | Giesecke+Devrient Mobile Security Gmbh | Integrated subscriber identity module with core OS and application OS |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101176100A (en) * | 2005-05-13 | 2008-05-07 | 英特尔公司 | Methods and apparatus for generating endorsement credentials for software-based security coprocessors |
CN101334824A (en) * | 2007-04-11 | 2008-12-31 | 趋势科技公司 | Portable secured computing environment for performing online confidential transactions in untrusted computers |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001025932A1 (en) * | 1999-10-01 | 2001-04-12 | Infraworks Corporation | Back-channeling in a memory vault system |
-
2011
- 2011-06-13 CN CN201110166629.XA patent/CN102833296B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101176100A (en) * | 2005-05-13 | 2008-05-07 | 英特尔公司 | Methods and apparatus for generating endorsement credentials for software-based security coprocessors |
CN101334824A (en) * | 2007-04-11 | 2008-12-31 | 趋势科技公司 | Portable secured computing environment for performing online confidential transactions in untrusted computers |
Also Published As
Publication number | Publication date |
---|---|
CN102833296A (en) | 2012-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI648649B (en) | Mobile communication device and method of operating same | |
CN106687980B (en) | Management program and virtual machine protection | |
TWI674533B (en) | Apparatus of authorizing an operation to be performed on a targeted computing device | |
US10650139B2 (en) | Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers | |
US9871821B2 (en) | Securely operating a process using user-specific and device-specific security constraints | |
TWI662432B (en) | Mobile communication device and method of operating thereof | |
CN102567662B (en) | For processing the apparatus and method of data | |
CN103353931B (en) | Security-enhanced computer system and method | |
EP3047375B1 (en) | Virtual machine manager facilitated selective code integrity enforcement | |
CN108351937A (en) | Computing device | |
CN109313690A (en) | Self-contained encryption boot policy verifying | |
US11436305B2 (en) | Method and system for signing an artificial intelligence watermark using implicit data | |
CN107077567A (en) | Identify the secure border on computing device | |
CN102833296B (en) | Method and apparatus for building safe computing environment | |
CN108595983A (en) | A kind of hardware structure and application context integrity measurement method based on hardware security isolated execution environment | |
EP3338214B1 (en) | Secure computation environment | |
US11520859B2 (en) | Display of protected content using trusted execution environment | |
CN104052602B (en) | Method and apparatus for single-sign-on | |
US11775347B2 (en) | Method for implanting a watermark in a trained artificial intelligence model for a data processing accelerator | |
US11443243B2 (en) | Method and system for artificial intelligence model training using a watermark-enabled kernel for a data processing accelerator | |
US11645116B2 (en) | Method and system for making an artificial intelligence inference using a watermark-enabled kernel for a data processing accelerator | |
US11740940B2 (en) | Method and system for making an artifical intelligence inference using a watermark-inherited kernel for a data processing accelerator | |
EP3935538A1 (en) | Secure policy ingestion into trusted execution environments | |
CN112650988A (en) | Method and system for encrypting data using kernel | |
US11475140B1 (en) | Enclave-based cryptography services in edge computing environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200408 Address after: Massachusetts, USA Patentee after: EMC IP Holding Company LLC Address before: Massachusetts, USA Patentee before: EMC Corp. |
|
TR01 | Transfer of patent right |